“With the pending addition of Stonesoft’s products and services, McAfee is making a significant investment in next-generation firewall technology. These solutions anticipate emerging customer needs in a continually evolving threat landscape,” said Michael DeCesare, McAfee President. “Stonesoft is a leading innovator in this important market segment. We plan to integrate Stonesoft’s offerings with other McAfee products to realize the power of McAfee’s Security Connected strategy. Stonesoft products will benefit from the collective expertise of more than 7,200 McAfee employees. Leveraging McAfee’s cloud-based Global Threat Intelligence service will provide our combined customers with unparalleled security.”

The rationale for the proposed acquisition is as follows:

Network security is a vital component of a comprehensive security solution. Next-generation firewalls solve critical customer needs and represent one of the fastest growing market segments in network security.

Stonesoft is a leading innovator in the next-generation firewall segment. Gartner positioned the company as “visionary” in the 2013 Network Security Firewall Magic Quadrant. Stonesoft achieved “Recommend” status in NSS Labs’ latest 2013 firewall tests.

With Stonesoft, McAfee expects to grow its network security business by delivering the industry’s most complete network security solution with three leading platforms: McAfee’s IPS Network Security Platform, McAfee’s Firewall Enterprise for the high assurance market segment, and Stonesoft’s next-generation firewall.

“The combination of the two companies allows Stonesoft to benefit from McAfee’s global presence and sales organization of over 2,200 employees, best-in-class threat research and technology synergies” said Ilkka Hiidenheimo, Chief Executive Officer of Stonesoft. “Combined, we believe we can offer our customers a world-class product portfolio with world-class support – all backed by Intel.”

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.